The Case for PIM/PAM in Today's Infosec

  • Webcast Aired Tuesday, 14 Jun 2016 1:00PM EDT (14 Jun 2016 17:00 UTC)
  • Speakers: Barbara Filkins, Ken Ammon

Even the most secure servers and networks may be vulnerable to attack using passwords that give attackers root access to a sensitive server or allow them to assume the privileged accounts created for critical backup or SCADA systems that need elevated access to secure systems.

Regulators are painting a target on privileged access, however, according to a Gartner analysis that predicts increases of up to 40% in fines for organizations that are too slow to drop passwords in favor of more secure authentication.

Privileged Identity Management (PIM) and Privileged Access Management (PAM) systems are already in place in many organizations to secure those weak points and bring organizations into compliance. Many are badly configured or only partly implemented, leaving important gaps in security that could remain invisible until a data breach or security audit makes them obvious.

This webcast will explore the regulations that could mean bad news for organization with poor access control, as well as some of the critical issues that make privileged-access controls less effective than they could be and things both IT vendors and InfoSec pros are doing to close holes in both compliance and security.

Webcast speakers will offer practical advice on the procurement and implementation of PIM/PAM systems -- especially within federal agencies where they are often required but still underutilized. They will also review organizational issues that make it harder to control privileged access and operational techniques to address even the stickiest of those problems.

Be among the first to receive the associated whitepaper written by Robert M. Lee and Barbara Filkins.

View the associated whitepaper here.